Unrated severityOSV Advisory· Published Jan 5, 2026· Updated Jan 6, 2026
Dify Vulnerable to Plaintext API Key Exposure via Model Provider Configuration Endpoint
CVE-2025-67732
Description
Dify is an open-source LLM app development platform. Prior to version 1.11.0, the API key is exposed in plaintext to the frontend, allowing non-administrator users to view and reuse it. This can lead to unauthorized access to third-party services, potentially consuming limited quotas. Version 1.11.0 fixes the issue.
Affected products
1- Range: 0.10.0, 0.10.1, 0.10.2, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/langgenius/dify/security/advisories/GHSA-phpv-94hg-fv9gmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.